CVE-2024-39181
📋 TL;DR
A buffer overflow vulnerability exists in Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 routers version 3.2. Attackers can exploit this by sending a specially crafted POST request to the ApCliSsid parameter, causing a Denial of Service (DoS) that crashes the device. Organizations using these specific router models are affected.
💻 Affected Systems
- Shenzhen Libituo Technology Co., Ltd LBT-T300
- Shenzhen Libituo Technology Co., Ltd LBT-T400
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device crash requiring physical reboot, potentially disrupting all network services until manual intervention.
Likely Case
Temporary service disruption affecting connected clients until device automatically reboots or is manually restarted.
If Mitigated
No impact if device is patched or network controls prevent exploitation attempts.
🎯 Exploit Status
Exploitation requires sending a crafted POST request to the vulnerable endpoint; no authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
Check vendor website for firmware updates; if available, download and install following vendor instructions.
🔧 Temporary Workarounds
Network Segmentation
allIsolate affected routers from untrusted networks to prevent exploitation.
Access Control Lists
allImplement firewall rules to block POST requests to the vulnerable endpoint.
🧯 If You Can't Patch
- Replace affected devices with patched or alternative models.
- Monitor network traffic for exploitation attempts and implement intrusion detection.
🔍 How to Verify
Check if Vulnerable:
Check device firmware version via web interface or CLI; if version is v3.2, device is vulnerable.
Check Version:
Check via device web interface or vendor-specific CLI commands.
Verify Fix Applied:
Verify firmware version is updated to a version later than v3.2.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to router management interface
- Device crash/reboot logs
Network Indicators:
- POST requests with oversized ApCliSsid parameter to router IP
SIEM Query:
source_ip="router_ip" AND http_method="POST" AND uri_contains="generate_conf_router" AND parameter_size>threshold